Free

Certified Cloud Security Professional (CCSP) Certification Prep

ISC2’s Certified Cloud Security Professional (CCSP) is a global leading cloud certification for IT security professionals. This certification prepares you to understand foundational cloud technologies, how to protect data in the cloud, understand the risk associated with cloud infrastructure, as well as the legal and compliance risks that come with cloud computing.

13
3
M
Time
intermediate
difficulty
13
ceu/cpe

Course Content

Domain 5: Cloud Security Operations

4m

Cloud Security Operations
Domain 4: Cloud Application Security

4m

Cloud Application Security
Domain 3: Cloud Platform and Infrastructure Security

3m

Cloud Platform and Infrastructure Security
Domain 6: Legal, Risk and Compliance

5m

Legal, Risk, and Compliance
Change and Configuration Management

8m

Cloud Security Operations
Cloud Infrastructure Components

5m

Cloud Platform and Infrastructure Security
Data Classification

6m

Cloud Data Security
Introduction

8m

Cloud Concepts, Architecture, and Design
Legal Risks of Cloud Computing

7m

Legal, Risk, and Compliance
Change Management

8m

Cloud Security Operations
Training and Awareness

6m

Cloud Application Security
The Management Plane

4m

Cloud Platform and Infrastructure Security
Data Roles

5m

Cloud Data Security
Domain 1: Cloud Concepts, Architecture, and Design

5m

Cloud Concepts, Architecture, and Design
Due Diligence and Due Care

4m

Legal, Risk, and Compliance
Security Operations Center (SOC)

8m

Cloud Security Operations
Administering Middleware

5m

Cloud Platform and Infrastructure Security
Cloud Data Lifecycle

5m

Cloud Data Security
Legal and Compliance Terms

5m

Legal, Risk, and Compliance
Log Review Challenges

5m

Cloud Security Operations
Course Description

The CCSP certification allows you to showcase your cloud computing knowledge and improve your organization’s security posture. It can also help you obtain an increase in compensation and create better positioning for new job opportunities.

Prerequisites for this ISC2 CCSP Training

While there are no prerequisites for this course, you should have basic knowledge of information security and cloud computing concepts.

CCSP Course Goals

By the end of this CCSP course, students should be able to:

  • Know what the CCSP exam is about
  • Understand all six CCSP domains
  • Be prepared for the CCSP exam
  • In our CCSP training course, you will obtain a complete understanding of security risks and mitigation strategies associated with data security in the cloud and become prepared to pass the CCSP exam.

    What is a Certified Cloud Security Professional?

    The Certified Cloud Security Professional (CCSP) is a fairly new certification, introduced in 2015 by the ISC2 and the Cloud Security Alliance (CSA), that was created due to the increased popularity of cloud computing and the security risks that came along with it.

    The CCSP certification signifies that individuals who have earned it not only have a thorough understanding of security associated with the cloud platform and infrastructure, but also with software, information, and other cyber environments.

    What Does this Online CCSP Training Entail?

    Our online Certified Cloud Security Professional course will provide you with the knowledge and skills to protect your organization’s cloud environment. With more and more companies moving information to the cloud, it has become crucial to have experts in cloud computing. This course will allow you to become one of those experts.

    CCSP training prepares you to successfully pass the CCSP exam to become a certified professional. Upon completion, you will have comprehensive knowledge to understand the security challenges that are common to different types of cloud computing services, to select and implement appropriate controls to ensure the security of cloud environments, and to identify, evaluate, and mitigate risks to your organization's cloud infrastructure. The course covers key topics like cloud computing concepts, cloud software assurance, data security strategies, cloud data storage architectures, cloud reference architecture, and application security.

    You will take an in-depth look at all six core domains of the CCSP Common Body of Knowledge (CBK):

  • Domain 1 - Cloud security architecture design concepts and requirements
  • Domain 2 - Cloud data security
  • Domain 3 - Cloud platform/infrastructure security
  • Domain 4 - Cloud application security
  • Domain 5 - Cloud security operations
  • Domain 6 - Legal risk and compliance
  • The CCSP training will introduce you to best practices in cloud services associated with security controls. This CCSP course is self-paced, so you can study and practice on your own schedule.

    How Useful is ISC2 CCSP Certification?

    Obtaining your certification shows that you are a competent, knowledgeable cloud security specialist who has hands-on experience in the field. Just by having the certification, you will be qualified for a number of job opportunities and a better salary.

    Some of the common job titles for CCSP certified employees include:

  • Security Administrator
  • Security Manager
  • Security Architect
  • Cloud Security Engineer
  • Security Consultant
  • Systems Engineer
  • Systems Architect
  • Enterprise Architect
  • This, of course, isn’t an exhaustive list. The above job titles could potentially represent many different roles within an organization.

    Becoming CCSP certified also means that you will likely be able to secure a higher salary than counterparts without certification. Exact salaries are hard to quote because the positions and organizations for CCSPs are so varied.

    What Do Cloud Security Professionals Do?

    A major part of being a CCSP is identifying critical information and executing the measures that reduce or eliminate the risk of exploitation for organizations. Knowledge of cloud architecture is needed to run and manage it. Some of the responsibilities of a CCSP may include:

  • Building and implementing infrastructures for cloud environments
  • Operating and overseeing infrastructures for cloud environments
  • Managing physical infrastructures for cloud environments
  • Building and operating logical infrastructures for cloud environments
  • Ensuring compliance with regulation and controls
  • Conducting risk assessments of physical and logical infrastructures
  • Understanding how to acquire, collect and preserve digital evidence
  • Managing communication with and identifying relevant parties
  • Auditing and monitoring of tools, mechanisms, and facilities
  • What is Involved in the ISC2 CCSP Certification Exam?

    The exam is a three-hour exam with 125 multiple-choice questions. You must earn at least 700 out of 1,000 points to pass successfully.

    The CCSP exam covers the six CCSP domains, which are as follows:

  • Cloud concepts and design
  • Cloud data security
  • Cloud platform and infrastructure security
  • Cloud application security
  • Security architecture design operations and service orchestration
  • Legal, Risk, and Compliance
  • You also must have the following to qualify for certification:

  • At least five years paid work experience in information technology
  • Three of the five years must consist of work in information security, and one year in one or more of the six domains (above)

    This course is part of a Career Path:
    Become a Cyber Security Engineer
    In this career path, you will learn what it takes to become a Security Engineer, a role in the highest demand with 57,000+ job openings according to cyberseek.org. Learn to resolve production security issues, configure and manage firewalls and intrusion detection systems (IDS), investigate incidents, perform forensics and run incident responses. Cybrary offers practical, virtual lab environments specific to Cyber Security Engineering that will help you gain real-world, hands-on skills with the industry’s latest tools and technologies.

    Instructed by

    Instructor
    Graham Wicas

    I am an Information Security Analyst, and I hold the following certifications: CISSP, CCSP, CISA, CRISC, and Sec+. I started my Information Security career in 2014 by accident after deciding not to pursue graduate school in Psychology because I was daunted by six more years of school. I was hired as a temporary employee at a SaaS software company. My first project was to get the product area ready for a SSAE-18 SOC 1 audit. Little did I know that learning control frameworks, interviewing stakeholders, and implementing controls, would be great fundamental training for a career in Information Security. After the SOC 1 was complete, they needed a SOC 2, which required implementing security awareness, vendor management, and improving the incident response process. My knowledge of audit controls enabled me to play a bigger role at the company and pivot into an analyst position on the Information Security team.

    I enjoy the coordination aspect of Information Security, such as bringing people together to identify risks, address the gaps, and improve processes to make the organization more secure. I laugh a little at the idea that I was put off by six more years of school but got into a career where you have to continually learn to stay on top of the new threats, vulnerabilities, and technology. Yet I enjoy continual learning so I know I’m in the right place. In my free time, I am a husband, father, chef, and fencer.

    I have used Cybrary to study for virtually every certification I have. Cybrary’s courses enabled me to gain 80% of the knowledge with 20% of the effort and 5% of the cost of common study resources. The knowledge I gained through certifications and courses enabled me to have a greater impact at work and derive more satisfaction from my job.

    Having gained so much from Cybrary’s resources personally and professionally, I leapt at the opportunity to become a Cybrary instructor. I was excited to help fellow cybersecurity progressionals expand their skills and knowledge by creating a course on the platform.

    I have a bachelors in Philosophy from Princeton University, as well as an MBA and MS in Business Analytics from Temple University’s Fox School of Business.

    Fun fact: In 2006, I won the 16 and under World Championship in Men’s epee fencing. I became the first American man to win an individual world championship in fencing in any age category.

    Provider
    Cybrary Logo
    Certification Body
    ISC2
    Certificate of Completion

    Complete this entire course to earn a Certified Cloud Security Professional (CCSP) Certification Prep Certificate of Completion

    Coming mid-July
    Cybrary Reimagined.
    Level up with structured, role-aligned career paths.
    ALL NEW!
    Cybrary Reimagined.
    Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
    Level up with structured, role-aligned career paths.
    Valid until October 31. Elevate your skills today!
    Start Now

    Heading

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    This is some text inside of a div block.
    Share

    Purpose Statement

    Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
    This is some text inside of a div block.
    This is some text inside of a div block.
    M
    Time
    This is some text inside of a div block.
    difficulty
    This is some text inside of a div block.
    ceu/cpe

    Overview

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Frequently Asked Questions
    No items found.
    What Will I Learn?
    Foundations
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Defensive Security
    Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
    Engineering and Operations
    Focused on building and operating information systems.
    Governance, Risk, and Compliance
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Leadership and Management
    Focused on program design and oversight. Covers project and program management.
    Offensive Security
    Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
    Offensive Security
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Path Outline

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Course Outline

    No items found.
    No items found.
    No items found.

    What Our Learners Are Saying

    Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

    No items found.